z-logo
open-access-imgOpen Access
Model of the Process of Conducting Computer Attacks Using Special Information Influences
Author(s) -
Sergey Kondakov,
Ilya Rud
Publication year - 2021
Publication title -
voprosy kiberbezopasnosti
Language(s) - English
Resource type - Journals
ISSN - 2311-3456
DOI - 10.21681/2311-3456-2021-5-12-20
Subject(s) - computer science , process (computing) , abstraction , computer security , information system , software engineering , programming language , engineering , philosophy , epistemology , electrical engineering
Purpose of work: development of a model of the process of conducting a computer attack. Research method: theory of complex systems, comparative analysis within the framework of system analysis and synthesis. Result: it is shown that the application of the proposed model of the process of conducting computer attacks allows you to fully describe the process, taking into account its inherent features and characteristics. The use in the model of information from the MITRE ATTACK database of Mitre, which contains a description of the tactics, techniques and methods used by cybercriminals, allows you to reduce the level of abstraction and describe specific scenarios for conducting complex targeted computer attacks with the maximum approximation to practice. The developed model is supposed to be used to form scenarios of computer attacks when assessing the security of information systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here